Privacy

The following 211 items are listed by Content Data.
Policies & Procedures

Oracle eBusiness Suite Policy

This sample policy outlines procedures for controlling access to and use of the Oracle eBusiness suite and database.
Subscriber Content
Mon, Jul 24, 2017
Policies & Procedures

Patient Admission Policy

This sample policy provides a consistent, standardized and proficient method for the admission of patients.
Subscriber Content
Mon, May 29, 2017
Newsletters

Board Oversight of Cyber Risk

Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Mon, May 1, 2017
Policies & Procedures

User Information Security Policy

This sample policy provides guidelines for securing user information.
Subscriber Content
Mon, Feb 20, 2017
Memos

Delegated Entity Review Memo

This memo focuses on IT SOX readiness procedures for an application, testing change management, computer operations and ...
Subscriber Content
Mon, Oct 10, 2016
Memos

Data Breach Notification Memo

This memo's purpose is to notify an individual regarding the possibility of a personal information breach and explain th...
Subscriber Content
Mon, May 2, 2016
Audit Programs

System Backup Review Audit Work Program

The purpose of this audit program is to review an organization’s system backup procedures.
Subscriber Content
Mon, Oct 26, 2015
Audit Programs

Security Policy Review Audit Work Program

The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Mon, Jun 1, 2015
Newsletters

Social Business: What it Means to Your Risk Profile

This issue of Board Perspectives: Risk Oversight discusses 10 examples of social business risks every company should mon...
Subscriber Content
Mon, May 6, 2013
Policies & Procedures

Blog and Social Networking Policy

The purpose of this policy is to ensure that all employee blog and social networking activities incorporate consistent s...
Subscriber Content
Mon, Apr 9, 2012
Audit Programs

System Intrusion Audit Work Program

The objective of this audit work program is to evaluate a business’s ability to detect unauthorized system access attemp...
Subscriber Content
Mon, Mar 5, 2012
Policies & Procedures

Security of Data Policy (with UNIX Example)

The following sample outlines a set of policies and procedures for Security of Data (with UNIX Example).
Subscriber Content
Mon, Mar 14, 2011